Skip to content

Commit

Permalink
chore(deps-dev): bump @eslint/json from 0.9.0 to 0.9.1
Browse files Browse the repository at this point in the history
Bumps [@eslint/json](https://github.com/eslint/json) from 0.9.0 to 0.9.1.
- [Release notes](https://github.com/eslint/json/releases)
- [Changelog](https://github.com/eslint/json/blob/main/CHANGELOG.md)
- [Commits](eslint/json@json-v0.9.0...json-v0.9.1)

---
updated-dependencies:
- dependency-name: "@eslint/json"
  dependency-type: direct:development
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
  • Loading branch information
dependabot[bot] authored Jan 14, 2025
1 parent 3baded2 commit fb7adf7
Show file tree
Hide file tree
Showing 2 changed files with 35 additions and 10 deletions.
43 changes: 34 additions & 9 deletions package-lock.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion package.json
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
}
],
"devDependencies": {
"@eslint/json": "^0.9.0",
"@eslint/json": "^0.9.1",
"@eslint/markdown": "^6.2.1",
"@stylistic/eslint-plugin-js": "^2.13.0",
"eslint": "^9.17.0",
Expand Down

1 comment on commit fb7adf7

@codethreat-sast-cloud
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚀 CodeThreat Security Scan Completed for UserScripts

Hello Team,

Great news! We've just completed a thorough security scan for UserScripts, and here's what we found:


Quick Overview

  • Duration: 00:01:29
  • Risk Score: F (This reflects the overall security posture based on the identified issues.)
  • Issues Fixed: 0 (The number of vulnerabilities resolved during this scan.)

🛠 Detailed Vulnerability Analysis

We've identified vulnerabilities across the codebase. Here's a detailed look:

Weakness Name Severity Count
Insecure Random Number Generator High 2
Detect Potential Xss In Template Literals Medium 39
Dynamic Code Execution Alert Critical 10
Redirection Input Validation Medium 1
Missing Timeout In Http Request Calls Low 3

🔗 Software Composition Analysis (SCA) Insights

package-lock.json

Severity Summary: Critical: 0 High: 0 Medium: 0 Low: 0

📈 Next Steps & Full Report

To dive deeper, click here to view the full report. It's essential to review these findings and plan the necessary fixes. If any of the critical/high issues need more discussion, let's set up a quick meeting to strategize our next steps.


🔒 Security isn't just a feature; it's a responsibility. Let's keep our codebase rock solid!

Please sign in to comment.